SlideShare a Scribd company logo
PHYSICAL SECURITY




Attacker
Physical Security

Not all attacks on your organization'
data come across the network

Many companies focus on an “iron-clad” network
security, but that does not protect them from physical
assault or theft of data.
Physical Security


   An example of this would be the recent identity theft
    incident at the Department of Veterans Affairs, which
    began with the theft of a company laptop.
Physical Security

   Increased importance

   Given the trend toward smaller, more lightweight PC
    components, physical security is growing increasingly
    important.

   It’s important to implement a physical access control
    program in a company and strictly enforce the measures.
Physical Security


   Attackers : Two Categories

       Outside the company

       From within the company
Physical Security

                  Impact of an attack

   These attackers can often cause systems to fail, and
    they can compromise password-protected computers by
    using a removable hard drive to gain access.

   Attackers can directly access networks by adding or
    rearranging the connections, and they can easily steal
    physical objects if they're already on the inside.
Physical Security

   Preventing Outside attackers

   Natural barriers: landscape and terrain

   Fencing: type and construction

   Walls and ceiling construction: high risk areas

   Gate facilities: security checkpoints
Physical Security
    Preventing Outside attackers
    Frequency of patrols and security checks

    Door and window locations and security devices used

    Reception areas: location and control of entry

    Employee surveillance and vigilance


    Parking areas: entrance/exit, access to facility
Physical Security
Armed Guards and Bulldogs are a good way to keep out attackers.
Physical Security
Preventing attackers from within
   Ex: Disgruntled or greedy employers or contactors.

   It’s important to implement a physical access control
    program in a company and strictly enforce the measures.

   If an attacker has physical access to a system they can
    wreak havoc.
Physical Security
Guidelines for restricting personal access:

   Create a badge program that includes an employee picture
    and possibly color-code specific areas of access.

   Make it a policy to question anyone who doesn't have a
    visible ID badge.

   Escort, observe, and supervise guests for their entire visit.
Physical Security
Guidelines for restricting personal access:
   Don't allow anyone – including vendors, salespeople, etc. – to
    connect personal laptops (or any other computing device) to the
    network.

   Don't allow anyone to add hardware or software to computers
    without proper authorization.

   Watch out for "tailgaters." These people wait for someone with
    access to enter a controlled area (such as one with a locked door)
    and then follow the authorized person through the door.
    Tailgaters enter without using their own key, card key, or lock
    combination.
Physical Security
Enforcement
Physical Security
Guidelines for protecting information and equipment access:

   Place monitors and printers away from windows and areas where
    unauthorized persons could easily observe them.

   Shred or otherwise destroy all sensitive information and media
    when it's no longer necessary.

   Don't leave documents unattended at fax machines or printers.

   Require all users to log off or power down workstations at the
    end of the working day.
Physical Security
Guidelines for protecting information and equipment access:

   Lock up portable equipment (e.g., laptops, PDAs, media,
    memory sticks) out of sight in a safe storage place overnight.

   Don't allow the removal of computers or storage media from
    the work area or facility without ensuring that the person
    removing it has authorization and a valid reason.

   Provide locks or cables to prevent theft, and lock computer
    cases.
Physical Security
Physical Security
    Strong Room
Physical Security

              Strong Rooms / Server Room

   This hardware contains highly sensitive information and access
    privileges that affect a company’s data system.

   Only a select few administrators should have access to this room.
Physical Security
           Strong Rooms / Server Room

   The room should have increased security mechanisms to
    prevent unauthorized entry.

   There should be camera/personnel surveillance on the
    entrance to ensure security.
Physical Security
Enforcement

More Related Content

What's hot

information security management
information security managementinformation security management
information security management
Gurpreetkaur838
 
Security Presentation
Security PresentationSecurity Presentation
Security PresentationGerhard Peens
 
Access Controls
Access ControlsAccess Controls
Access Controls
primeteacher32
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
Mostafa Elgamala
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
Gary Bahadur
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
BiggBoss4Unseen
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Daniel P Wallace
 
Access control
Access controlAccess control
Access control
Mohibullah Saail
 
Security policy
Security policySecurity policy
Security policy
Dhani Ahmad
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
Alfred Ouyang
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
Alfred Ouyang
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
Maganathin Veeraragaloo
 
Security risk management
Security risk managementSecurity risk management
Security risk management
G Prachi
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
Ken Holmes
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
Denis kisina
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
Muhammad Sahputra
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Innocent Korie
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 

What's hot (20)

information security management
information security managementinformation security management
information security management
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
Access Controls
Access ControlsAccess Controls
Access Controls
 
Security Audit View
Security Audit ViewSecurity Audit View
Security Audit View
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Access control
Access controlAccess control
Access control
 
Security policy
Security policySecurity policy
Security policy
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 

Similar to Physical security.ppt

Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructure
Pallavi Agarwal
 
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITYPSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
Major K. Subramaniam Kmaravehlu
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
Haseeb Ahmed Awan
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
ANAND MURALI
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpagenakomuri
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
Janani S
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docx
MVNVKUMAR
 
Physical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdfPhysical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdf
feelinggift
 
SECURITY CONTROLS
SECURITY CONTROLSSECURITY CONTROLS
SECURITY CONTROLS
successdsp
 
now a days security is very important to organization and physical s.pdf
now a days security is very important to organization and physical s.pdfnow a days security is very important to organization and physical s.pdf
now a days security is very important to organization and physical s.pdf
sooryasalini
 
Remote access security services are crucial for several reasons_.pdf
Remote access security services are crucial for several reasons_.pdfRemote access security services are crucial for several reasons_.pdf
Remote access security services are crucial for several reasons_.pdf
SomiHan224
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & CyberPaul Andrews
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
Ajay Jassi
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
MohanPandey31
 
08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt
Roshni814224
 
Securing Management Information Systems.ppt
Securing Management Information Systems.pptSecuring Management Information Systems.ppt
Securing Management Information Systems.ppt
Roshni814224
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
Jeffery Brown
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
Zara Nawaz
 

Similar to Physical security.ppt (20)

Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructure
 
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITYPSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpage
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docx
 
Physical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdfPhysical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdf
 
SECURITY CONTROLS
SECURITY CONTROLSSECURITY CONTROLS
SECURITY CONTROLS
 
now a days security is very important to organization and physical s.pdf
now a days security is very important to organization and physical s.pdfnow a days security is very important to organization and physical s.pdf
now a days security is very important to organization and physical s.pdf
 
Remote access security services are crucial for several reasons_.pdf
Remote access security services are crucial for several reasons_.pdfRemote access security services are crucial for several reasons_.pdf
Remote access security services are crucial for several reasons_.pdf
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt
 
Securing Management Information Systems.ppt
Securing Management Information Systems.pptSecuring Management Information Systems.ppt
Securing Management Information Systems.ppt
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 

More from Faheem Ul Hasan

Bomb threat checklist
Bomb threat checklistBomb threat checklist
Bomb threat checklist
Faheem Ul Hasan
 
Workplace Safety And Security Hotel.Ppt
Workplace Safety And Security Hotel.PptWorkplace Safety And Security Hotel.Ppt
Workplace Safety And Security Hotel.PptFaheem Ul Hasan
 
Guarding Against Robbery & Assault
Guarding Against  Robbery & AssaultGuarding Against  Robbery & Assault
Guarding Against Robbery & Assault
Faheem Ul Hasan
 
Security Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptSecurity Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.Ppt
Faheem Ul Hasan
 
Terrorism And Its Hazards
Terrorism And Its HazardsTerrorism And Its Hazards
Terrorism And Its HazardsFaheem Ul Hasan
 
Terrorism A Global Threat
Terrorism A Global ThreatTerrorism A Global Threat
Terrorism A Global ThreatFaheem Ul Hasan
 
Safety & Security Hotel
Safety &  Security HotelSafety &  Security Hotel
Safety & Security HotelFaheem Ul Hasan
 
Fundamentals Of Fire Extinguishers
Fundamentals Of Fire ExtinguishersFundamentals Of Fire Extinguishers
Fundamentals Of Fire ExtinguishersFaheem Ul Hasan
 
Fire Exinguisher
Fire ExinguisherFire Exinguisher
Fire Exinguisher
Faheem Ul Hasan
 
Fire Extinguisher How To Used
Fire Extinguisher How To UsedFire Extinguisher How To Used
Fire Extinguisher How To Used
Faheem Ul Hasan
 
Terrorism South Asia
Terrorism South AsiaTerrorism South Asia
Terrorism South Asia
Faheem Ul Hasan
 
Chemical Suicides Presentation
Chemical Suicides PresentationChemical Suicides Presentation
Chemical Suicides PresentationFaheem Ul Hasan
 
South Asia Intelligence Report
South Asia Intelligence ReportSouth Asia Intelligence Report
South Asia Intelligence ReportFaheem Ul Hasan
 
W Kplace Violence & Security Presentation
W Kplace Violence & Security PresentationW Kplace Violence & Security Presentation
W Kplace Violence & Security PresentationFaheem Ul Hasan
 

More from Faheem Ul Hasan (20)

PATROLLING
PATROLLINGPATROLLING
PATROLLING
 
Bomb threat checklist
Bomb threat checklistBomb threat checklist
Bomb threat checklist
 
Workplace Safety And Security Hotel.Ppt
Workplace Safety And Security Hotel.PptWorkplace Safety And Security Hotel.Ppt
Workplace Safety And Security Hotel.Ppt
 
Guarding Against Robbery & Assault
Guarding Against  Robbery & AssaultGuarding Against  Robbery & Assault
Guarding Against Robbery & Assault
 
Security Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptSecurity Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.Ppt
 
Terrorism And Its Hazards
Terrorism And Its HazardsTerrorism And Its Hazards
Terrorism And Its Hazards
 
Terrorism A Global Threat
Terrorism A Global ThreatTerrorism A Global Threat
Terrorism A Global Threat
 
Safety & Security Hotel
Safety &  Security HotelSafety &  Security Hotel
Safety & Security Hotel
 
Fundamentals Of Fire Extinguishers
Fundamentals Of Fire ExtinguishersFundamentals Of Fire Extinguishers
Fundamentals Of Fire Extinguishers
 
Fire Exinguisher
Fire ExinguisherFire Exinguisher
Fire Exinguisher
 
Fire Extinguisher How To Used
Fire Extinguisher How To UsedFire Extinguisher How To Used
Fire Extinguisher How To Used
 
Terrorism South Asia
Terrorism South AsiaTerrorism South Asia
Terrorism South Asia
 
Chemical Suicides Presentation
Chemical Suicides PresentationChemical Suicides Presentation
Chemical Suicides Presentation
 
Risk Advisory
Risk AdvisoryRisk Advisory
Risk Advisory
 
South Asia Intelligence Report
South Asia Intelligence ReportSouth Asia Intelligence Report
South Asia Intelligence Report
 
Global Terrorism
Global TerrorismGlobal Terrorism
Global Terrorism
 
Terrorism Update
Terrorism UpdateTerrorism Update
Terrorism Update
 
Khyber Assessment 2011
Khyber Assessment 2011Khyber Assessment 2011
Khyber Assessment 2011
 
Travel Risk Advisory
Travel Risk AdvisoryTravel Risk Advisory
Travel Risk Advisory
 
W Kplace Violence & Security Presentation
W Kplace Violence & Security PresentationW Kplace Violence & Security Presentation
W Kplace Violence & Security Presentation
 

Recently uploaded

Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 

Recently uploaded (20)

Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 

Physical security.ppt

  • 2. Physical Security Not all attacks on your organization' data come across the network Many companies focus on an “iron-clad” network security, but that does not protect them from physical assault or theft of data.
  • 3. Physical Security  An example of this would be the recent identity theft incident at the Department of Veterans Affairs, which began with the theft of a company laptop.
  • 4. Physical Security  Increased importance  Given the trend toward smaller, more lightweight PC components, physical security is growing increasingly important.  It’s important to implement a physical access control program in a company and strictly enforce the measures.
  • 5. Physical Security  Attackers : Two Categories  Outside the company  From within the company
  • 6. Physical Security Impact of an attack  These attackers can often cause systems to fail, and they can compromise password-protected computers by using a removable hard drive to gain access.  Attackers can directly access networks by adding or rearranging the connections, and they can easily steal physical objects if they're already on the inside.
  • 7. Physical Security  Preventing Outside attackers  Natural barriers: landscape and terrain  Fencing: type and construction  Walls and ceiling construction: high risk areas  Gate facilities: security checkpoints
  • 8. Physical Security  Preventing Outside attackers  Frequency of patrols and security checks  Door and window locations and security devices used  Reception areas: location and control of entry  Employee surveillance and vigilance  Parking areas: entrance/exit, access to facility
  • 9. Physical Security Armed Guards and Bulldogs are a good way to keep out attackers.
  • 10. Physical Security Preventing attackers from within  Ex: Disgruntled or greedy employers or contactors.  It’s important to implement a physical access control program in a company and strictly enforce the measures.  If an attacker has physical access to a system they can wreak havoc.
  • 11. Physical Security Guidelines for restricting personal access:  Create a badge program that includes an employee picture and possibly color-code specific areas of access.  Make it a policy to question anyone who doesn't have a visible ID badge.  Escort, observe, and supervise guests for their entire visit.
  • 12. Physical Security Guidelines for restricting personal access:  Don't allow anyone – including vendors, salespeople, etc. – to connect personal laptops (or any other computing device) to the network.  Don't allow anyone to add hardware or software to computers without proper authorization.  Watch out for "tailgaters." These people wait for someone with access to enter a controlled area (such as one with a locked door) and then follow the authorized person through the door. Tailgaters enter without using their own key, card key, or lock combination.
  • 14. Physical Security Guidelines for protecting information and equipment access:  Place monitors and printers away from windows and areas where unauthorized persons could easily observe them.  Shred or otherwise destroy all sensitive information and media when it's no longer necessary.  Don't leave documents unattended at fax machines or printers.  Require all users to log off or power down workstations at the end of the working day.
  • 15. Physical Security Guidelines for protecting information and equipment access:  Lock up portable equipment (e.g., laptops, PDAs, media, memory sticks) out of sight in a safe storage place overnight.  Don't allow the removal of computers or storage media from the work area or facility without ensuring that the person removing it has authorization and a valid reason.  Provide locks or cables to prevent theft, and lock computer cases.
  • 17. Physical Security Strong Room
  • 18. Physical Security Strong Rooms / Server Room  This hardware contains highly sensitive information and access privileges that affect a company’s data system.  Only a select few administrators should have access to this room.
  • 19. Physical Security Strong Rooms / Server Room  The room should have increased security mechanisms to prevent unauthorized entry.  There should be camera/personnel surveillance on the entrance to ensure security.